Monday, May 17, 2021

Webcast: Inside Recent Insider Attacks

Webcast: Inside Recent Insider Attacks Presenter: Dr. Neil Daswani, Co-Director of the Stanford Advanced Security Certification program & President, Daswani Enterprises 2020 was the year that several high-profile organizations including Twitter, Tesla, and Shopify announced that insiders attempted to do everything from poison fleets of automated cars to steal customer transaction records. This webcast will describe the technical mechanisms that insiders have circumvented in past insider breaches, as well as the psychological profile of insiders. Join us for guidance on technical countermeasures that can help detect insiders that may turn malicious, as well as how to screen for personality characteristics that may indicate a potential new hire or employee might be risky. This webcast is sponsored by Code42. Code42 is the Insider Risk Management leader. Native to the cloud, Code42 Incydr rapidly detects data loss, leak, theft and sabotage as well as speeds incident response. See the full library of RSAC webcasts here: https://www.rsaconference.com/library...[Webcast]

Thursday, March 25, 2021

When Application Security “The Wrong Way” Is the Right Thing for Your Organization

When Application Security “The Wrong Way” Is the Right Thing for Your Organization
RSA Conference Presenter: Jennifer Czaplewski, Director, Product Security, Target What’s a common challenge for application security teams? To drive meaningful change and scale to the pace and size of IT. Target’s experience was no different—so the team switched from enforcer to teacher. This session will describe successes in implementing a “credit score” to measurement practices, building an exclusive(!) security champions program, and changing how to “test all the things.” https://www.rsaconference.com/virtual...​

Monday, August 17, 2020

Malicious Documents Emerging Trends: A Gmail Perspective


RSA Conference
Elie Bursztein, Security and Anti-Abuse Research Lead, Google
Everyday Gmail defenses analyze billions of attachments to prevent malicious documents from reaching the inboxes of its users whether they are end-users or corporate ones. This talk provides a comprehensive analysis of the malicious documents that target users and corporate inboxes, an in-depth analysis of the latest evasion tactics used by attackers and what Google is doing about it.Pre-Requisites: A general understanding of what malware are. A basic knowledge of what macro, javascript, clustering, ip/asn, packer, droppers, botnets, malware as a service and exploits are. Some notion of what obfuscation is and, a basic familiarity with fud (fully undetectable documents) and adversarial attacks.

Monday, April 13, 2020

Making the Leap: Transforming from Techie to Security Leader

•Feb 25, 2020

RSA Conference: Todd Fitzgerald, CISO, Cybersecurity Leadership Author, CISO SPOTLIGHT, LLC

You have been a techie and developed great security skills. Now you want to move into management. Should you? Will you be happy there? How will your life change? Is this a good move? How will you get there? This session will examine what this career choice really means—and how to move to a CISO/security leader role.

Wednesday, March 11, 2020

Protecting Data from Ransomware and Breaches: Demos and Designs

RSA Conference: Michael Ekstrom, Lead Cybersecurity Engineer, MITRE,Mary Yang, Portfolio Manager, The MITRE Corporation

Little is as valuable to an enterprise as its data and protecting it can seem an overwhelming task. Join cybersecurity engineers from NIST’s NCCoE as they demystify data security by demonstrating their latest standards-based guidance on mitigating the impact of ransomware and data breaches using off-the-shelf tools.

Monday, February 10, 2020

Regina Hartley: Why the best hire might not have the prefect resume

Given the choice between a job candidate with a perfect resume and one who has fought through difficulty, human resources executive Regina Hartley always gives the "Scrapper" a chance. As someone who grew up with adversity, Hartley knows that those who flourish in the darkest of spaces are empowered with the grit to persist in an ever-changing workplace. "Choose the underestimated contender, whose secret weapons are passion and purpose," she says. "Hire the Scrapper."

Wednesday, January 29, 2020

Looking for a job? Highlight your ability, not your experience. (Jason Shen)

Very few of us hold jobs that line up directly with our past experiences or what we studied in college. Take TED Resident Jason Shen; he studied biology but later became a product manager at a tech company. In this quick, insightful talk about human potential, Shen shares some new thinking on how job seekers can make themselves more attractive -- and why employers should look for ability over credentials.

Monday, January 13, 2020

How data will transform the future

What does the future of business look like? In an informative talk, Philip Evans gives a quick primer on two long-standing theories in strategy -- and explains why he thinks they are essentially invalid.